Swot Analysis : Security And Compliance Policy Essay

848 WordsAug 7, 20154 Pages
Introduction We need an IT Security and Compliance policy to provide information security procedures and guidelines within our company to safe guard our proprietary information and personal data of our employees and customers. Information security is the study and practice of protecting information. The main goal of information security is to protect its confidentiality, integrity, and availability. This encompasses both outside attackers and inside threats that may affect one or more of the CIA Triad. Risk analysis is important because the goal of risk analysis is the review known vulnerabilities and threats in order to make an informed decision whether to mitigate the risk, avoid the risk, transfer the risk or simply just accept the risk. We use risk analysis to establish a baseline of our security infrastructure and analysis changes and hardening procedures to establish a more secure and layered security approach. Our security and compliance policy sets forth rules that employees will follow in order to protect all data types within the organization and use the network for which it was intended and necessary for business operations. Risk Analysis (Detailed SWOT analysis) SWOT Analysis is a useful technique for understanding your Strengths and Weaknesses, and for identifying both the Opportunities open to you and the Threats you face. Our detailed swot analysis is listed below. Strengths We patch operating systems regularly and update our anti-virus, and anti-malware
Open Document